Linux Privilege Escalation
Enmeration
Basic Enemetation
System Information Gathering
Finding internal Network information
Process and Network Information
Firewall and Scheduled Tasks Information
File Permissions and Installed Software
SUID/GID Privilege Escalation
More Enumeration help:
Automated tool for enumeration
Linpeas
unix-privesc-check
Looking for credential reuse
Check .ssh Directory and Copy id_rsa file
Spreaing found ssh file
Checking for Sudo version
Exploiting Exposed Confidential information.
Inspecting Service Footprints & Privilege Escalation
Privilege Escalation
Inspecting service footprints
Abusing cron jobs
Checking Cron Job Logs
Exploiting Writable Cron Jobs
Abusing Password authentication
Insecure System Components
Abusing SetUid Binary
Abusing Capabilities
Abusing Sudo
Exploiting kernel vulnerability
Revershell in .sh files
Last updated

